Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (24)
- Earth Sciences (14)
- Mathematics (12)
- Geology (11)
- Astrophysics and Astronomy (7)
-
- Chemistry (6)
- Physics (6)
- Information Security (3)
- Biochemistry, Biophysics, and Structural Biology (2)
- Business (2)
- Databases and Information Systems (2)
- E-Commerce (2)
- Life Sciences (2)
- Technology and Innovation (2)
- Biochemistry (1)
- Categorical Data Analysis (1)
- Engineering (1)
- Leisure Studies (1)
- Other Computer Sciences (1)
- Portfolio and Security Analysis (1)
- Social and Behavioral Sciences (1)
- Statistics and Probability (1)
- Keyword
-
- Machine learning (4)
- Data (3)
- Handwriting Recognition (3)
- Historical Document Processing (3)
- Indonesia (3)
-
- Paradox Basin (3)
- Aneth (2)
- Augmentation (2)
- Blockchain (2)
- CAT (2)
- Carbonate (2)
- Cassini (2)
- Central Indonesia (2)
- Character (2)
- Control Theory (2)
- Convolutional Neural Networks (2)
- Cryptocurrency (2)
- Cybersecurity (2)
- Diagenesis (2)
- Document Image Analysis (2)
- Earthquakes (2)
- Evacuation (2)
- Fluid simulation (2)
- Fully Convolutional Neural Networks (2)
- Handwriting (2)
- Imbricated boulders (2)
- Inundation maps (2)
- Java Trench (2)
- Julia (2)
- Kinetic proteomics (2)
- Publication
- Publication Type
Articles 1 - 30 of 93
Full-Text Articles in Physical Sciences and Mathematics
Fine-Grained Topic Models Using Anchor Words, Jeffrey A. Lund
Fine-Grained Topic Models Using Anchor Words, Jeffrey A. Lund
Theses and Dissertations
Topic modeling is an effective tool for analyzing the thematic content of large collections of text. However, traditional probabilistic topic modeling is limited to a small number of topics (typically no more than hundreds). We introduce fine-grained topic models, which have large numbers of nuanced and specific topics. We demonstrate that fine-grained topic models enable use cases not currently possible with current topic modeling techniques, including an automatic cross-referencing task in which short passages of text are linked to other topically related passages. We do so by leveraging anchor methods, a recent class of topic model based on non-negative matrix …
Evaluating An Educational Cybersecurity Playable Case Study, Tanner West Johnson
Evaluating An Educational Cybersecurity Playable Case Study, Tanner West Johnson
Theses and Dissertations
The realities of cyberattacks have become more and more prevalent in the world today. Due to the growing number of these attacks, the need for highly trained individuals has also increased. Because of a shortage of qualified candidates for these positions, there is an increasing need for cybersecurity education within high schools and universities. In this thesis, I discuss the development and evaluation of Cybermatics, an educational simulation, or playable case study, designed to help students learn and develop skills within the cybersecurity discipline.
This playable case study was designed to allow students to gain an understanding of the field …
Designing Cybersecurity Competitions In The Cloud: A Framework And Feasibility Study, Chandler Ryan Newby
Designing Cybersecurity Competitions In The Cloud: A Framework And Feasibility Study, Chandler Ryan Newby
Theses and Dissertations
Cybersecurity is an ever-expanding field. In order to stay current, training, development, and constant learning are necessary. One of these training methods has historically been competitions. Cybersecurity competitions provide a method for competitors to experience firsthand cybersecurity concepts and situations. These experiences can help build interest in, and improve skills in, cybersecurity.
While there are diverse types of cybersecurity competitions, most are run with on-premise hardware, often centralized at a specific location, and are usually limited in scope by available hardware. This research focuses on the possibility of running cybersecurity competitions, specifically CCDC style competitions, in a public cloud environment. …
Nonlinear Optical Characterization Of Solids, Alex Farnsworth
Nonlinear Optical Characterization Of Solids, Alex Farnsworth
Undergraduate Honors Theses
Vibrational Sum Frequency Generation (VSFG) and the similar Second Harmonic Generation (SHG) are both classified as nonlinear optical phenomena, with the hallmark trait being that the input and output frequencies are different. Both of these systems are remarkable tools due to their surface specific nature. Still, there is much that is not known about the response from these systems, especially the nonresonant SFG response. We have worked to better understand SFG signal, specifically the nonresonant temporal profile. We have also collected results that call into question some underlying assumptions about time-based suppression methods when working with single crystal substrates.
As …
User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson
User Attitudes About Duo Two-Factor Authentication At Byu, Jonathan Dutson
Undergraduate Honors Theses
Simple password-based authentication provides insufficient protection against increasingly common incidents of online identity theft and data loss. Although two-factor authentication (2FA) provides users with increased protection against attackers, users have mixed feelings about the usability of 2FA. We surveyed the students, faculty, and staff of Brigham Young University (BYU) to measure user sentiment about DUO Security, the 2FA system adopted by BYU in 2017. We find that most users consider DUO to be annoying, and about half of those surveyed expressed a preference for authentication without using a second-factor. About half of all participants reported at least one instance of …
Security Analysis And Recommendations For Coniks As A Pki Solution For Mobile Apps, George Bradley Spendlove
Security Analysis And Recommendations For Coniks As A Pki Solution For Mobile Apps, George Bradley Spendlove
Theses and Dissertations
Secure mobile apps, including end-to-end encrypted messaging apps such as Whats-App and Signal, are increasingly popular today. These apps require trust in a centralized key directory to automatically exchange the public keys used to secure user communication. This trust may be abused by malicious, subpoenaed, or compromised directories. A public key infrastructure (PKI) solution that requires less trust would increase the security of these commonly used apps.CONIKS is a recent PKI proposal that features transparent key directories which publish auditable digests of the public keys they present to queriers. By monitoring its key every time a new digest is published, …
Improving The Quality Of Neural Machine Translation Using Terminology Injection, Duane K. Dougal
Improving The Quality Of Neural Machine Translation Using Terminology Injection, Duane K. Dougal
Theses and Dissertations
Most organizations use an increasing number of domain- or organization-specific words and phrases. A translation process, whether human or automated, must also be able to accurately and efficiently use these specific multilingual terminology collections. However, comparatively little has been done to explore the use of vetted terminology as an input to machine translation (MT) for improved results. In fact, no single established process currently exists to integrate terminology into MT as a general practice, and especially no established process for neural machine translation (NMT) exists to ensure that the translation of individual terms is consistent with an approved terminology collection. …
Endocytosis As An Additional Mechanism Of Glucose Transport To The Hexose Transporter In Trypanosoma Brucei, Jongsu Choi
Endocytosis As An Additional Mechanism Of Glucose Transport To The Hexose Transporter In Trypanosoma Brucei, Jongsu Choi
Theses and Dissertations
Trypanosoma brucei is an extracellular kineotoplastid parasite that causes human African trypanosomiasis (HAT), also known as sleeping sickness. As trypanosomes undergo vector to host transition, heavy transcriptional adaptation such as metabolic shift to glycolysis and upregulated endocytosis occurs. Specifically, glycolysis in the infectious stage becomes the sole source of energy production; thus, the glucose transport mechanism in T. brucei provides one of the most promising therapeutic targets for development of new drugs to treat HAT. Despite an established trypanosome hexose transporter (THT) model for glucose transport across the plasma membrane, there remains gaps in the detailed mechanism of glucose transport …
The Use Of Tissue And Serum ”˜Omics' Methods To Characterize Disease, Ying Ding
The Use Of Tissue And Serum ”˜Omics' Methods To Characterize Disease, Ying Ding
Theses and Dissertations
Preeclampsia (PE) is a multisystem disorder that contributes to maternal and fetal mortality and morbidity worldwide. It is characterized by de-novo hypertension and proteinuria or other maternal organ damage after 20 weeks of gestation. Evidence suggested that endogenous digitalis-like factor (EDLF) contributes to the pathogenesis of PE, and that the potential source of EDLF is the placenta. EDLF can inhibit the sodium pump (SP) specifically and may lead to hypertension, it has also been associated with hypoxia, oxidative stress and other abnormalitites present in PE.We studied whether normal human placenta responded to SP inhibition casued by EDLF with a change …
Flow Adaptive Video Object Segmentation, Fanqing Lin
Flow Adaptive Video Object Segmentation, Fanqing Lin
Theses and Dissertations
We tackle the task of semi-supervised video object segmentation, i.e, pixel-level object classification of the images in video sequences using very limited ground truth training data of its corresponding video. Recently introduced online adaptation of convolutional neural networks for video object segmentation (OnAVOS) has achieved good results by pretraining the network, fine-tuning on the first frame and training the network at test time using its approximate prediction as newly obtained ground truth. We propose Flow Adaptive Video Object Segmentation (FAVOS) that refines the generated adaptive ground truth for online updates and utilizes temporal consistency between video frames with the help …
Usable Security And Privacy For Secure Messaging Applications, Elham Vaziripour
Usable Security And Privacy For Secure Messaging Applications, Elham Vaziripour
Theses and Dissertations
The threat of government and corporate surveillance around the world, as well as the publicity surrounding major cybersecurity attacks, have increased interest in secure and private end-to-end communications. In response to this demand, numerous secure messaging applications have been developed in recent years. These applications have been welcomed and publically used not just by political activists and journalists but by everyday users as well. Most of these popular secure messaging applications are usable because they hide many of the details of how encryption is provided. The strength of the security properties of these applications relies on the authentication ceremony, wherein …
Penetration Depth Variation In Atomic Layer Deposition On Multiwalled Carbon Nanotube Forests, David Alan Kane
Penetration Depth Variation In Atomic Layer Deposition On Multiwalled Carbon Nanotube Forests, David Alan Kane
Theses and Dissertations
Atomic Layer Deposition (ALD) of Al2O3 on tall multiwalled carbon nanotube forests shows concentration variation with the depth in the form of discrete steps. While ALD is capable of extremely conformal deposition in high aspect ratio structures, decreasing penetration depth has been observed over multiple thermal ALD cycles on 1.3 mm tall multiwalled carbon nanotube forests. SEM imaging with Energy Dispersive X-ray Spectroscopy elemental analysis shows steps of decreasing intensity corresponding to decreasing concentrations of Al2O3. A study of these steps suggests that they are produced by a combination of diffusion limited delivery of precursors with increasing precursor adsorption site …
Discovery Of Paleotsunami Deposits Along Eastern Sunda Arc: Potential For Megathrust Earthquakes In Bali, Hanif Ibadurrahman Sulaeman
Discovery Of Paleotsunami Deposits Along Eastern Sunda Arc: Potential For Megathrust Earthquakes In Bali, Hanif Ibadurrahman Sulaeman
Theses and Dissertations
Several laterally extensive candidate tsunami deposits are preserved along coastlines facing the eastern Java Trench, indicating it has experienced mega-thrust earthquakes in the past. We investigated 37 coastal sites in Bali, Lombok, Sumba and Timor islands, many of which preserve course sand and pebble layers that overlie sharp basal contacts with scour marks into the mud, fine upward in grain size, and have bimodal grain size distributions. Other unique features are the common occurrence of marine fossils and concentrations of heavy minerals. The occurrence of these high-energy deposits interlayered with clay-rich units indicates the coarse clastics are anomalous because they …
Discovery Of Paleotsunami Deposits Along Eastern Sunda Arc: Potential For Megathrust Earthquakes In Bali, Hanif Ibadurrahman Sulaeman
Discovery Of Paleotsunami Deposits Along Eastern Sunda Arc: Potential For Megathrust Earthquakes In Bali, Hanif Ibadurrahman Sulaeman
Theses and Dissertations
Several laterally extensive candidate tsunami deposits are preserved along coastlines facing the eastern Java Trench, indicating it has experienced mega-thrust earthquakes in the past. We investigated 37 coastal sites in Bali, Lombok, Sumba and Timor islands, many of which preserve course sand and pebble layers that overlie sharp basal contacts with scour marks into the mud, fine upward in grain size, and have bimodal grain size distributions. Other unique features are the common occurrence of marine fossils and concentrations of heavy minerals. The occurrence of these high-energy deposits interlayered with clay-rich units indicates the coarse clastics are anomalous because they …
Cake Cam: Take Your Photo And Be In It Too, Candice Lynn Davis
Cake Cam: Take Your Photo And Be In It Too, Candice Lynn Davis
Theses and Dissertations
In this thesis we explore a different kind of computer-mediated collaboration (CMC) in which two people collaborate to perform a single task in a time-sensitive asymmetric situation wherein one person is more invested in the outcome than the other is. Our conjecture is that interactive computing can quickly communicate intent, which may help mediate time-sensitive asymmetric tasks between two people. We explore this idea specifically in the context of asking a stranger to take one's picture at a tourist site. Consider a tourist handing a cell phone to a complete stranger and asking the stranger to take the tourist's picture …
Normally Supportive Sublattices Of Crystallographic Space Groups, Miles A. Clemens
Normally Supportive Sublattices Of Crystallographic Space Groups, Miles A. Clemens
Theses and Dissertations
Normal subgroups can be thought of as the primary building blocks for decomposing mathematicalgroups into quotient groups. The properties of the resulting quotient groups are oftenused to determine properties of the group itself. This thesis considers normal subgroups of threedimensionalcrystallographic space groups that are themselves three-dimensional crystallographicspace groups; for convenience, we refer to such a subgroup as a csg-normal subgroup. We identifypractical restrictions on csg-normal subgroups that facilitate their tabulation. First, the point groupof an csg-normal subgroup must be a normal subgroup of the crystallographic point group of thespace group, which we refer to for convenience as a cpg-normal subgroup. …
The Bird And The Fish: Motion Field-Based Frame Interpolation In The Context Of A Story, Thomas Sterling Ellsworth
The Bird And The Fish: Motion Field-Based Frame Interpolation In The Context Of A Story, Thomas Sterling Ellsworth
Theses and Dissertations
Animating by hand can be a long and challenging process in part because of the necessity of drawing every frame by hand. 3D animation media minimize this problem with the use of automatically interpolated frames, but despite significant research no universally acceptable techniques have been demonstrated for 2 dimensional interpolation. In this paper we explore computer-assisted optimizations to the animation pipeline. Specifically, we utilize 3D motion fields to create more realistic in-between frames for sets of 2D ``key frames.'' We demonstrate our method by using it to create 2D special effects for a 30-second clip of an animated short film.
Toward Real-Time Flip Fluid Simulation Through Machine Learning Approximations, Javid Kennon Pack
Toward Real-Time Flip Fluid Simulation Through Machine Learning Approximations, Javid Kennon Pack
Theses and Dissertations
Fluids in computer generated imagery can add an impressive amount of realism to a scene, but are particularly time-consuming to simulate. In an attempt to run fluid simulations in real-time, recent efforts have attempted to simulate fluids by using machine learning techniques to approximate the movement of fluids. We explore utilizing machine learning to simulate fluids while also integrating the Fluid-Implicit-Particle (FLIP) simulation method into machine learning fluid simulation approaches.
Divisibility Properties Of Coefficients Of Modular Functions Of Genus Zero Levels, Merrill Warnick
Divisibility Properties Of Coefficients Of Modular Functions Of Genus Zero Levels, Merrill Warnick
Undergraduate Honors Theses
We prove divisibility results for the Fourier coefficients of canonical basis elements for the spaces of weakly holomorphic modular forms of weight 0 and levels 6, 10, 12, 18 with poles only at the cusp at infinity. In addition, we show that these Fourier coefficients satisfy Zagier duality in all weights, and give a general formula for the generating functions of such canonical bases for all genus zero levels. These results originally appeared in a paper of the same title that was accepted by the journal Integers, and was authored by the present author, with Paul Jenkins and Vicki
Clean Indices Of Common Rings, Benjamin L. Schoonmaker
Clean Indices Of Common Rings, Benjamin L. Schoonmaker
Theses and Dissertations
Lee and Zhou introduced the clean index of rings in 2004. Motivated by this work, Basnet and Bhattacharyya introduced both the weak clean index of rings and the nil clean index of rings and Cimpean and Danchev introduced the weakly nil clean index of rings. In this work, we calculate each of these indices for the rings ℤ/nℤ and matrix rings with entries in ℤ/nℤ. A generalized index is also introduced.
Netlight: Cloud Baked Indirect Illumination, Nathan Andrew Zabriskie
Netlight: Cloud Baked Indirect Illumination, Nathan Andrew Zabriskie
Theses and Dissertations
Indirect lighting drastically increases the realism of rendered scenes but it has traditionally been very expensive to calculate. This has long precluded its use in real-time rendering applications such as video games which have mere milliseconds to respond to user input and produce a final image. As hardware power continues to increase, however, some recently developed algorithms have started to bring real-time indirect lighting closer to reality. Of specific interest to this paper, cloud-based rendering systems add indirect lighting to real-time scenes by splitting the rendering pipeline between a server and one or more connected clients. However, thus far they …
Writing And Designing A Chapter On Mercury And Pluto For The Textbook Exploring The Planets (Explanet.Info), Braxton Clark Spilker
Writing And Designing A Chapter On Mercury And Pluto For The Textbook Exploring The Planets (Explanet.Info), Braxton Clark Spilker
Theses and Dissertations
Exploring the Planets (http://explanet.info) is a free online college textbook covering thebasic concepts of planetary science emphasizing the character and evolution of the planetarybodies in the Solar System. The latest edition (3rd edition) was published online in 2007 by EricH Christiansen. Since the release of the third edition, two important planetary missions havebeen completed: MESSENGER (to Mercury) and New Horizons (to Pluto). These missionsprovided new information and fundamental insights into these planetary bodies, which have notyet been included in Exploring the Planets. The modern results based on recent investigations ofMercury and Pluto are critical for our understanding of the nature …
Using Machine Learning To Accurately Predict Ambient Soundscapes From Limited Data Sets, Katrina Lynn Pedersen
Using Machine Learning To Accurately Predict Ambient Soundscapes From Limited Data Sets, Katrina Lynn Pedersen
Theses and Dissertations
The ability to accurately characterize the soundscape, or combination of sounds, of diverse geographic areas has many practical implications. Interested parties include the United States military and the National Park Service, but applications also exist in areas such as public health, ecology, community and social justice noise analyses, and real estate. I use an ensemble of machine learning models to predict ambient sound levels throughout the contiguous United States. Our data set consists of 607 training sites, where various acoustic metrics, such as overall daytime L50 levels and one-third octave frequency band levels, have been obtained. I have data for …
Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart
Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart
Theses and Dissertations
We use a Fully Convolutional Neural Network (FCNN) to classify pixels in historical document images, enabling the extraction of high-quality, pixel-precise and semantically consistent layers of masked content. We also analyze a dataset of hand-labeled historical form images of unprecedented detail and complexity. The semantic categories we consider in this new dataset include handwriting, machine-printed text, dotted and solid lines, and stamps. Segmentation of document images into distinct layers allows handwriting, machine print, and other content to be processed and recognized discriminatively, and therefore more intelligently than might be possible with content-unaware methods. We show that an efficient FCNN with …
Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart
Fully Convolutional Neural Networks For Pixel Classification In Historical Document Images, Seth Andrew Stewart
Theses and Dissertations
We use a Fully Convolutional Neural Network (FCNN) to classify pixels in historical document images, enabling the extraction of high-quality, pixel-precise and semantically consistent layers of masked content. We also analyze a dataset of hand-labeled historical form images of unprecedented detail and complexity. The semantic categories we consider in this new dataset include handwriting, machine-printed text, dotted and solid lines, and stamps. Segmentation of document images into distinct layers allows handwriting, machine print, and other content to be processed and recognized discriminatively, and therefore more intelligently than might be possible with content-unaware methods. We show that an efficient FCNN with …
Development And Use Of Lipidomics And Proteomics Methods To Identify And Measure Pro-Survival Metabolic Pathways In Cancer, Monique Merilyn Speirs
Development And Use Of Lipidomics And Proteomics Methods To Identify And Measure Pro-Survival Metabolic Pathways In Cancer, Monique Merilyn Speirs
Theses and Dissertations
Throughout society’s continual war against cancer, we have attempted pharmacological intervention only to find that tumors develop modes of resistance. It is well known that genetics play an integral role in cancer. Technological advances have greatly improved our ability to study cancer biochemistry beyond the genome by measuring changes in the expression and activity of RNA, proteins, and lipids in experimental models and human patients. As our techniques and technology to perform cancer research progresses, it is becoming more evident that cancer cells develop stress tolerance mechanisms at multiple levels within the central dogma, including altering mRNA expression, enzyme concentrations, …
A Quantitative Study Of The Deployment Of The Sender Policy Framework, Eunice Zsu Tan
A Quantitative Study Of The Deployment Of The Sender Policy Framework, Eunice Zsu Tan
Theses and Dissertations
Email has become a standard form of communication between businesses. With the prevalent use of email as a form of communication between businesses and customers, phishing emails have emerged as a popular social engineering approach. With phishing, attackers trick users into divulging their personal information through email spoofing. Thus, it is imperative to verify the sender of an email. Anti-spoofing mechanisms such as the Sender Policy Framework (SPF) have been developed as the first line of defense against spoofing by validating the source of an email as well as the presenting options of how to handle emails that fail to …
Certificate Revocation Table: Leveraging Locality Of Reference In Web Requests To Improve Tls Certificate Revocation, Luke Austin Dickinson
Certificate Revocation Table: Leveraging Locality Of Reference In Web Requests To Improve Tls Certificate Revocation, Luke Austin Dickinson
Theses and Dissertations
X.509 certificate revocation defends against man-in-the-middle attacks involving a compromised certificate. Certificate revocation strategies face scalability, effectiveness, and deployment challenges as HTTPS adoption rates have soared. We propose Certificate Revocation Table (CRT), a new revocation strategy that is competitive with or exceeds alternative state-of-the-art solutions in effectiveness, efficiency, certificate growth scalability, mass revocation event scalability, revocation timeliness, privacy, and deployment requirements. The CRT periodically checks the revocation status of X.509 certificates recently used by an organization, such as clients on a university's private network. By prechecking the revocation status of each certificate the client is likely to use, the client …
Using Aviris And Machine Learning To Map And Discriminate Bull Kelp And Giant Kelp Along The Pacific Coast Of The United States, Tanner Thompson, Dr. Ryan Jensen
Using Aviris And Machine Learning To Map And Discriminate Bull Kelp And Giant Kelp Along The Pacific Coast Of The United States, Tanner Thompson, Dr. Ryan Jensen
Journal of Undergraduate Research
Kelp forests provide food and shelter for many organisms, and they are an important part of coastal ecosystems throughout the world. Along the Pacific coast of the United States, kelp forests are made up of two species of kelp: bull kelp (Nereocystis Leutkana) and giant kelp (Macrocystis Pyrifera). While similar, these two species are physiologically and structurally different.
Fitting Parameter Uncertainties In Least Squares Fitting, R. Steven Turley
Fitting Parameter Uncertainties In Least Squares Fitting, R. Steven Turley
Faculty Publications
This article review the theory and practice of computing uncertainties in the fit parameters in least squares fits. It shows how to estimate the uncertainties and gives some numerical examples in Julia of their use. Examples are given and validated for both linear and nonlinear fits.